Blog Posts Tagged with "DDoS"

The reality is that office voice communications are not going away any time soon. In fact, with the popularity of UC, we’re seeing the role of the UC mobile client increase to handle live video, text messages and more.

Cyber-extortion is becoming a booming business, at least for criminals who threaten companies with distributed denial of service (DDoS) attacks, a recent survey from DDoS protection company Corero reveals.

As DDoS continues to be used as a cyber-weapon against websites and online resources, organizations should ensure that they have a response plan in place that includes these mitigation techniques, to help deny attempted denial-of-service attacks.

Through the use of dedicated DDoS mitigation devices, Carrier Grade NAT devices and their associated customers are protected from service disruptions, while still ensuring legitimate traffic is allowed unencumbered.

In my daily engagements with various customers of all shapes and sizes, it’s truly interesting to see how the approach to DDoS mitigation is changing. Much of this is the result of DDoS mitigation services shifting from a “nice to have” technology to a “must-have”, essential in order to maintain business continuity and availability.

In reality, a well-prepared cyber attack does not need to last for 15 minutes to succeed. After preparations it takes only seconds to conduct the attack which may hit targets next door as well as those on the other side of the world.

The banking world must be prepared, it is one of the sectors that will be subject to a major number of attacks in next year, they are considered privileged targets for hacktivists, state sponsored hackers and cyber criminals...

Why not deploy an intelligent appliance behind the router and in front of the firewall? Filter out all the junk before you expend any resources in your firewall, or log all the events with your IDS/SEIM. Reduce your need for multiple servers and load balancers. This is like a reverse osmosis for your network...

This is significant because very few companies or organizations have the necessary network infrastructure to deal with such attacks. There might be some companies with popular websites such as Google or Facebook that are able to handle such high-bandwidth floods, but most companies are not...

In order to mitigate this threat, ISPs will need to combine their efforts. It would take a global effort on the part of the ISPs. Until then, the capabilities are there to deal with the issue when it arises on a per incident basis...

With all the media hype over Stuxnet, cyber war and cyber weapons – should US citizens be legally allowed to own and use these weapons in accordance with their 2nd Amendment rights? Why shouldn’t Americans be allowed to actively defend themselves against online electronic risks as well as physical threats?

“Q2 data showed a return to traditional infrastructure attacks and is likely a reflection of changing tools for launching DDoS attacks. With Layer 7 attacks, the risk of detection and eventual take down by law enforcement increases because these attacks disclose the IP address of the attacking botnet..."

The indictment alleges that Ryan Cleary controlled a large botnet of potentially hundreds of thousands of units to conduct DDoS attacks and would rent out his botnet for certain time periods in exchange for money from individuals interested in conducting DDoS attacks targeting specific victims...

North Korean operatives have been detected launching cyber attacks on Incheon International Airport systems and also spreading a virus planted in gaming programs intended to transform user's machines in zombies for a large botnet to launch DDoS attacks...